A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

A survey on blockchain-based identity management and decentralized privacy for personal data

K Gilani, E Bertin, J Hatin… - 2020 2nd Conference on …, 2020 - ieeexplore.ieee.org
In the digital revolution, even secure communication between individuals, services and
devices through centralized digital entities presents considerable risks. Having service …

[PDF][PDF] Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology

A Pfitzmann, M Hansen - Version v0, 2008 - Citeseer
Based on the nomenclature of the early papers in the field, we propose a terminology which
is both expressive and precise. More particularly, we define anonymity, unlinkability …

[PDF][PDF] Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology

A Pfitzmann, M Hansen - 2005 - Citeseer
Based on the nomenclature of the early papers in the field, we propose a terminology which
is both expressive and precise. More particularly, we define anonymity, unlinkability …

Privacy and data protection issues of biometric applications

EJ Kindt - A Comparative Legal Analysis, 2013 - Springer
The author of this book–an updated version of her Ph. D. dissertation at the Catholic
University of Leuven in Belgium–is clearly no stranger in the world of biometrics and …

[PDF][PDF] A comparative study on privacy preserving techniques for location based services

AK Tyagi, N Sreenath - British Journal of Mathematics & …, 2015 - researchgate.net
In recent years, enhancement in wireless and mobile technologies, location based services
(LBSs) has become more and more popular. Location based services provide enhanced …

Privacy-enhancing identity management

M Hansen, P Berlich, J Camenisch, S Clauß… - … security technical report, 2004 - Elsevier
Privacy-Enhancing Technologies (PET) are the technical answer to social and legal privacy
requirements. PET become constituents for tools to manage users' personal data. Users can …

A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds …

K Beckers, I Côté, S Faßbender, M Heisel… - Requirements …, 2013 - Springer
Assembling an information security management system (ISMS) according to the ISO 27001
standard is difficult, because the standard provides only very sparse support for system …

[PDF][PDF] Privacy threats in software architectures

K Wuyts - 2015 - lirias.kuleuven.be
With privacy becoming a key concern in modern society, it is important that privacy
measures are strongly incorporated whenever digital data are involved. Unfortunately …

Design options for privacy-respecting reputation systems within centralised internet communities

S Steinbrecher - IFIP International Information Security Conference, 2006 - Springer
Reputation systems play an important role in Internet communities like eBay. They allow
members of the community to estimate other members' behaviour before an interaction …